Protect your Identities with Azure AD Identity Protection (part 1)
To read part 2 please click here
What is Azure Active Directory Identity Protection?
What are risks?
Risks can be known as a suspicious activity and actions by the users when they sign in, or when they take actions after signing in. Hence, the risks are categorized into two ways- as user risks and sign-in risks.
A user risk is caused when a user's identity or account is compromised and can include:
Risk |
Description |
Unusual
behavior |
The
account showed unusual activity or the patterns of usage are similar to those
patterns that the Microsoft systems and experts have identified as attacks. |
Leaked
credentials |
The
user’s credentials could have been leaked. For example the Microsoft might
have found a list of the leaked credentials on the dark web, which could
affect your user account. |
Sign-in Risk
Risk |
Description |
Unfamiliar
sign-in properties |
Identity
Protection remembers and learns a particular user’s sign-in history. For
example when a sign-in occurs from a location that’s unusual for the user, a
risk detection is triggered. |
Atypical
travel |
For
example, when two or more sign-ins occurs from distant locations in an unrealistically
short time period, a risk detection is raised. |
Malware-linked
IP address |
For
example, if the IP address where the sign-in originates is known to have been
in contact with an active bot server, risk
detection is raised. |
Anonymous
IP address |
For
example, a sign-in originates from an anonymous IP address. As these details
can be used by the attackers to hide their real IP address or location, a
risk detection is raised. |
Detect risks with Azure AD Identity Protection policies
Different types of risk policies are available based on the type of identity risk and you can also use a sign-in risk policy or a user risk policy.
Sign-in risk policy
A sign-in risk policy scrutinizes every sign-in, and gives it a risk score which indicates the probability that the sign-in was attempted by the person whose credentials are used. According to the risk level, you can choose whether to allow access, automatically block, or allow access only after additional requirements are met while also using a form to configure a sign-in risk policy in the Azure portal and specify the settings such as:
- The users this policy should target.
- The conditions that must be met, such as how high a score triggers a policy.
- How you want to respond.
User risk policy
You can easily specify the settings like the users this policy should target, the conditions that must be met, and how you'll respond while making sure that the users are already registered for the self-service password reset before you apply this policy and after a user risk is identified, the user is asked to take action to remediate that risk while also knowing what triggered the risk, and what they need to provide to resolve the issue.
To read part 2 please click here
Comments
Post a Comment